scholarly journals A Security Scheme of 5G Ultradense Network Based on the Implicit Certificate

2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Zhonglin Chen ◽  
Shanzhi Chen ◽  
Hui Xu ◽  
Bo Hu

The ultradense network (UDN) is one of the most promising technologies in the fifth generation (5G) to address the network system capacity issue. It can enhance spatial reuse through the flexible, intensive deployment of small base stations. A universal 5G UDN architecture is necessary to realize the autonomous and dynamic deployment of small base stations. However, the security of the 5G UDN is still in its infancy, and the data communication security among the network entities is facing new challenges. In this paper, we proposed a new security based on implicit certificate (IC) scheme; the scheme solves the security problem among the access points (APs) in a dynamic APs group (APG) and between the AP and user equipment (UE). We present each phase regarding how two network entities obtain the Elliptic Curve Qu-Vanstone (ECQV) implicit certificate scheme, verify each other’s identity, and share keys in an UDN. Finally, we extensively analyze our lightweight security communication model in terms of security and performance. The simulation on network bandwidth evaluation is also conducted to prove the efficiency of the solution.

Author(s):  
M.S. M. Gismalla ◽  
M.F. L. Abdullah

Visible light communication VLC is deemed as futuristic technology applied for both illumination and data communication due to the low-cost energy consumption, long life expectancy, huge bandwidth, and high security compared to radio frequency RF. Uncovered area, minimum signal-to-noise ratio (SNR) and received power results from the non-uniform distribution of small base stations (i.e. Optical attocells) in the room. In this paper, the researchers propose a new LEDs distribution of five optical attocells configuration model in order to optimize the received power distribution and SNR at the center of the room for indoor VLC system. The optical attocells configuration in terms of received power to fill the uncovered area at the center of the room has been investigated. The simulation results showed that the proposed attocells configuration saved 24.9% of the transmitted power. Besides that, the whole room was covered uniformly.  As a result, the received power and SNR are improved.


Sensors ◽  
2021 ◽  
Vol 21 (12) ◽  
pp. 4022
Author(s):  
Seong Jung Kim ◽  
Jeong Gon Kim

With the rapid deployment of present-day mobile communication systems, user traffic requirements have increased tremendously. An ultra-dense network is a configuration in which the density of small base stations is greater than or equal to that of the user equipment. Ultra-dense networks are considered as the key technology for 5th generation networks as they can improve the link quality and increase the system capacity. However, in an ultra-dense network, small base stations are densely positioned, so one user equipment may receive signals from two or more small base stations. This may cause a severe inter-cell interference problem. In this study, we considered a coordinated multi-point scenario, a cooperative technology between base stations to alleviate the interference. In addition, to suppress the occurrence of severe interference at the cell edges, link formation was carried out by considering the degree of cell load for each cluster. After the formation of links between all the base stations and user equipment, a subcarrier allocation procedure was performed. The subcarrier allocation method used in this study was based on the location of base stations with clustering to improve the data rate and reduce the interference between the clusters. Power allocation was based on the channel gain between the base station and user equipment. Simulation results showed that the proposed scheme delivered a higher sum rate than the other resource allocation methods reported previously for various types of user equipment.


2019 ◽  
Vol 13 (2) ◽  
pp. 14-31
Author(s):  
Mamdouh Alenezi ◽  
Muhammad Usama ◽  
Khaled Almustafa ◽  
Waheed Iqbal ◽  
Muhammad Ali Raza ◽  
...  

NoSQL-based databases are attractive to store and manage big data mainly due to high scalability and data modeling flexibility. However, security in NoSQL-based databases is weak which raises concerns for users. Specifically, security of data at rest is a high concern for the users deployed their NoSQL-based solutions on the cloud because unauthorized access to the servers will expose the data easily. There have been some efforts to enable encryption for data at rest for NoSQL databases. However, existing solutions do not support secure query processing, and data communication over the Internet and performance of the proposed solutions are also not good. In this article, the authors address NoSQL data at rest security concern by introducing a system which is capable to dynamically encrypt/decrypt data, support secure query processing, and seamlessly integrate with any NoSQL- based database. The proposed solution is based on a combination of chaotic encryption and Order Preserving Encryption (OPE). The experimental evaluation showed excellent results when integrated the solution with MongoDB and compared with the state-of-the-art existing work.


Sensors ◽  
2021 ◽  
Vol 21 (6) ◽  
pp. 1960
Author(s):  
Azade Fotouhi ◽  
Ming Ding ◽  
Mahbub Hassan

In this paper, we address the application of the flying Drone Base Stations (DBS) in order to improve the network performance. Given the high degrees of freedom of a DBS, it can change its position and adapt its trajectory according to the users movements and the target environment. A two-hop communication model, between an end-user and a macrocell through a DBS, is studied in this work. We propose Q-learning and Deep Q-learning based solutions to optimize the drone’s trajectory. Simulation results show that, by employing our proposed models, the drone can autonomously fly and adapts its mobility according to the users’ movements. Additionally, the Deep Q-learning model outperforms the Q-learning model and can be applied in more complex environments.


Author(s):  
Johan Muliadi Kerta ◽  
David Wennoris ◽  
Tonny Gunawan ◽  
Erny Erny

Along with the development of the company to run operations such as data communication and perform other transactions to relations and vice versa, PT Finroll just uses the public network such as sending email to their partners. Data information is not safe in public because it can be tapped or intercepted by unauthorized person. With the Virtual Private Network (VPN), PT Finroll can do business in secure environment to their partners. The methodologies used in this research are data collection that was started by surveying, interviewing, and analyzing the current network topology, performance and design requirements that support network design. From these results, PT Finroll can increase productivity and performance from competition in their business. In addition, with this research company has a better ability to increase their competitiveness in present and the future. 


Sign in / Sign up

Export Citation Format

Share Document